Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, Directus' TUS resumable upload endpoint (/files/tus) allows any authenticated user with basic file upload permissions to overwrite arbitrary existing files by UUID. The TUS controller performs only collection-level authorization checks, verifying the user has some permission on directus_files, but never validates item-level access to the specific file being replaced. As a result, row-level permission rules (e.g., "users can only update their own files") are completely bypassed via the TUS path while being correctly enforced on the standard REST upload path. This vulnerability is fixed in 11.16.1.
Published: 2026-04-06
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted File Overwrite
Action: Apply Patch
AI Analysis

Impact

Directus' TUS resumable upload endpoint (/files/tus) allowed any authenticated user with basic file upload permissions to overwrite arbitrary existing files by specifying their UUIDs. The controller performed only collection-level authorization and never validated item-level access to the specific file being replaced. As a result, row-level permission rules that normally prevent users from modifying files they do not own were bypassed. An attacker could replace any stored file with malicious content, compromising data integrity and potentially enabling further attacks.

Affected Systems

This vulnerability affects Directus versions earlier than 11.16.1. All installations of Directus prior to 11.16.1 are vulnerable; installations of 11.16.1 and later are not impacted.

Risk and Exploitability

The flaw scores 7.1 on the CVSS scale, indicating high severity. Exploitation requires only authentication and standard upload rights, making it relatively easy for legitimate users. No public exploits or KEV listings are currently available. The attack vector is authenticated.

Generated by OpenCVE AI on April 7, 2026 at 02:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Directus to version 11.16.1 or later.

Generated by OpenCVE AI on April 7, 2026 at 02:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qqmv-5p3g-px89 Directus: TUS Upload Authorization Bypass Allows Arbitrary File Overwrite
History

Mon, 20 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Monospace
Monospace directus
CPEs cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
Vendors & Products Monospace
Monospace directus

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Directus
Directus directus
Vendors & Products Directus
Directus directus

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, Directus' TUS resumable upload endpoint (/files/tus) allows any authenticated user with basic file upload permissions to overwrite arbitrary existing files by UUID. The TUS controller performs only collection-level authorization checks, verifying the user has some permission on directus_files, but never validates item-level access to the specific file being replaced. As a result, row-level permission rules (e.g., "users can only update their own files") are completely bypassed via the TUS path while being correctly enforced on the standard REST upload path. This vulnerability is fixed in 11.16.1.
Title Directus has a TUS Upload Authorization Bypass Allows Arbitrary File Overwrite
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}


Subscriptions

Directus Directus
Monospace Directus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T16:23:16.091Z

Reserved: 2026-04-02T17:03:42.075Z

Link: CVE-2026-35412

cve-icon Vulnrichment

Updated: 2026-04-07T16:23:13.322Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T22:16:22.397

Modified: 2026-04-20T16:40:33.237

Link: CVE-2026-35412

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:36:46Z

Weaknesses